메뉴 건너뛰기




Volumn 5, Issue , 2004, Pages 160-169

Toward an automated verification of certificates of authenticity

Author keywords

Asymmetric traveling salesman problem; Certificates of authenticity; Point compression

Indexed keywords

BAR CODES; DATA COMPRESSION; ENCODING (SYMBOLS); HEURISTIC METHODS; PROBABILITY; PROBLEM SOLVING; SECURITY OF DATA; SET THEORY;

EID: 3242793330     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/988772.988797     Document Type: Conference Paper
Times cited : (18)

References (19)
  • 1
    • 0002982976 scopus 로고
    • Performance guarantees for approximation algorithms depending on parametrized triangle inequalities
    • T. Andreae and H. Bandelt. Performance guarantees for approximation algorithms depending on parametrized triangle inequalities. SIAM Journal of Discrete Mathematics, Vol.8, pp.1-16, 1995.
    • (1995) SIAM Journal of Discrete Mathematics , vol.8 , pp. 1-16
    • Andreae, T.1    Bandelt, H.2
  • 2
    • 3242761223 scopus 로고    scopus 로고
    • Personal Communication
    • D.W. Bauder. Personal Communication.
    • Bauder, D.W.1
  • 3
    • 3242809513 scopus 로고
    • An anti-counterfeiting concept for currency systems
    • Sandia National Labs. Albuquerque, NM
    • D.W. Bauder. An Anti-Counterfeiting Concept for Currency Systems. Research report PTK-11990. Sandia National Labs. Albuquerque, NM, 1983.
    • (1983) Research Report , vol.PTK-11990
    • Bauder, D.W.1
  • 4
    • 3242746521 scopus 로고
    • Machine reading of visual counterfeit deterrent features and summary of US research, 1980-90
    • Ottawa, Canada, Septemeber
    • S. Church and D. Littman. Machine reading of Visual Counterfeit Deterrent Features and Summary of US Research, 1980-90. Four Nation Group on Advanced Counterfeit Deterrence, Ottawa, Canada, Septemeber 1991.
    • (1991) Four Nation Group on Advanced Counterfeit Deterrence
    • Church, S.1    Littman, D.2
  • 5
    • 0020097689 scopus 로고
    • On the worst-case performance of some algorithms for the asymmetric traveling salesman problem
    • A.M. Frieze, G. Galbiati, and F. Maffioli. On the worst-case performance of some algorithms for the asymmetric traveling salesman problem. Networks, Vol.12, no.1, pp.23-39, 1982.
    • (1982) Networks , vol.12 , Issue.1 , pp. 23-39
    • Frieze, A.M.1    Galbiati, G.2    Maffioli, F.3
  • 7
    • 84976789814 scopus 로고
    • Efficient algorithms for shortest paths in sparse networks
    • D.B. Johnson. Efficient algorithms for shortest paths in sparse networks. Journal of the ACM, Vol.24, no.1, pp.1-13, 1977.
    • (1977) Journal of the ACM , vol.24 , Issue.1 , pp. 1-13
    • Johnson, D.B.1
  • 11
    • 0018015137 scopus 로고
    • Modeling by shortest data description
    • J. Rissanen. Modeling by Shortest Data Description. Automatica, Vol.14, pp.465-471, 1978.
    • (1978) Automatica , vol.14 , pp. 465-471
    • Rissanen, J.1
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 13
    • 84944486544 scopus 로고
    • Prediction and entropy of printed English
    • C.E. Shannon. Prediction and entropy of printed English. Bell Systems Technical Journal, pp.50-64, 1951.
    • (1951) Bell Systems Technical Journal , pp. 50-64
    • Shannon, C.E.1
  • 16
    • 3242812593 scopus 로고
    • A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
    • Springer-Verlag
    • Y. Desmedt and A. Odlyzko. A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. CRYPTO, Springer-Verlag, pp.516-522, 1985.
    • (1985) CRYPTO , pp. 516-522
    • Desmedt, Y.1    Odlyzko, A.2
  • 17
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • Springer-Verlag
    • D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. CRYPTO, Springer-Verlag, pp.1-12, 1998.
    • (1998) CRYPTO , pp. 1-12
    • Bleichenbacher, D.1
  • 18
    • 84957066742 scopus 로고    scopus 로고
    • A new signature forgery strategy
    • Springer-Verlag
    • J.-S. Coron, D. Naccache, and J.P. Stern. A New Signature Forgery Strategy. CRYPTO, Springer-Verlag, pp.1-18, 1999.
    • (1999) CRYPTO , pp. 1-18
    • Coron, J.-S.1    Naccache, D.2    Stern, J.P.3
  • 19
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures: How to sign with RSA and Rabin
    • Springer-Verlag
    • M. Bellare and P. Rogaway. The exact security of digital signatures: how to sign with RSA and Rabin. EUROCRYPT, Springer-Verlag, pp.399-414, 1996.
    • (1996) EUROCRYPT , pp. 399-414
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.